Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jhvf-7c85-3c9g

Опубликовано: 01 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

LocalAI cross-site request forgery vulnerability

A Cross-Site Request Forgery (CSRF) vulnerability exists in the mudler/localai application, allowing attackers to craft malicious webpages that, when visited by a victim, perform unauthorized actions on the victim's local LocalAI instance without their consent. This vulnerability enables attackers to exhaust system resources, consume credits, and fill disk space by making numerous resource-intensive API calls, such as generating images or uploading files. The vulnerability stems from the application's acceptance of simple request content-types without requiring CSRF tokens or implementing other CSRF mitigation measures. Successful exploitation does not require network access to the vulnerable LocalAI environment.

Пакеты

Наименование

github.com/go-skynet/LocalAI

go
Затронутые версииВерсия исправления

<= 2.7.0

Отсутствует

EPSS

Процентиль: 30%
0.00112
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 6.5
nvd
почти 2 года назад

A Cross-Site Request Forgery (CSRF) vulnerability exists in the mudler/localai application, allowing attackers to craft malicious webpages that, when visited by a victim, perform unauthorized actions on the victim's local LocalAI instance without their consent. This vulnerability enables attackers to exhaust system resources, consume credits, and fill disk space by making numerous resource-intensive API calls, such as generating images or uploading files. The vulnerability stems from the application's acceptance of simple request content-types without requiring CSRF tokens or implementing other CSRF mitigation measures. Successful exploitation does not require network access to the vulnerable LocalAI environment.

EPSS

Процентиль: 30%
0.00112
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-352